VID |
19083 |
Severity |
30 |
Port |
53 |
Protocol |
UDP |
Class |
DNS |
Detailed Description |
According to its self-reported version, the instance of ISC BIND 9 running on the remote name server is 9.10.5-S1 to 9.10.5-S4, 9.10.6-S1 or 9.10.6-S2. It is, therefore, affected by an assertion failure vulnerability which exists in badcache.c due to selecting a SERVFAIL rcode instead of a FORMERR rcode. An unauthenticated attacker can exploit this to cause an assertion failure when the request doesn't contain all the expected information.
* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.
* References: https://kb.isc.org/docs/aa-01562
* Platforms Affected: Internet Software Consortium, BIND version 9.10.x < 9.10.6-S3 Any operating system Any version |
Recommendation |
Upgrade to the latest version of BIND (9.10.6-S3 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/downloads/BIND/ |
Related URL |
CVE-2018-5734 (CVE) |
Related URL |
103189 (SecurityFocus) |
Related URL |
(ISS) |
|